A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
Efficient and Secure Mobile Cloud Networking
[article]
2021
arXiv
pre-print
Mobile cloud computing is a very strong candidate for the title "Next Generation Network" which empowers mobile users with extended mobility, service continuity and superior performance. ...
This architecture, named OCMCA (Operator Centric Mobile Cloud Architecture), connects the user from one side and the Cloud Service Provider (CSP) from the other and hosts a cloud within its network. ...
security) and compare its security against the mobile cloud architecture found in literature. ...
arXiv:2102.09051v2
fatcat:jfdwtdw75nef3fmxwaogbazxvq
Security for Mobile and Adhoc Network
2020
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
A MANET is a distributed infrastructure-less network and in major cases it is concerned about the individual level of security solutions, since the MANET is a kind of decentralized type of network and ...
In this paper we give the overview of the security in MANET and in case if there is any attack how the Network can be protected with theuse of the different security and protection technique. ...
Figure 1: Mobile Ad hoc Network As the MANETs are self-organizing network and each node acts as router, server and client as well. ...
doi:10.35940/ijitee.e2905.059720
fatcat:bglfbq5kofavfo7lf7skcymoj4
Securing Mobile Adhoc Networks And Cloud Environment
2018
Zenodo
Securing mobile adhoc networks and cloud environment in opposition to denial of service attack by examine and predict the network traffic. ...
Ad-Hoc Networks to detect anomalous physical or virtual nodes. ...
Conclusion In this paper of dissimilar technique for detecting and prevent DDOS Securing mobile adhoc networks system and the relative analysis amongst them has been converse is in advance attractiveness ...
doi:10.5281/zenodo.1197526
fatcat:3no4dkm6ibgb3dpiyepzoytina
Security and Privacy in Wireless and Mobile Networks
2018
Future Internet
Particularly, apart from network and link layer security, the focus is on the security and privacy of mobile software platforms and the increasingly differing spectrum of mobile or wireless apps. ...
Currently, at the dawn of 5G networks, and the era of the Internet-of-Things, wireless and mobile networking is becoming increasingly ubiquitous. ...
The security risks due to design shortcomings and vulnerabilities related to end-user behavior when interacting with mobile devices is the focus of the work by Vasileios Gkioulos, Gaute Wangen and Sokratis ...
doi:10.3390/fi10020018
fatcat:yestvrnf7rat5diyoofemnlb3y
Wireless and Mobile Networks: Security and Privacy Issues
2017
Journal of Electrical and Computer Engineering
In the paper entitled " e High Security Mechanisms Algorithm of Similarity Metrics for Wireless and Mobile Networking" X. ...
With the advent of G networks in the era of Internet of ings (IoT), wireless and mobile networking have become prevalent everywhere. ...
and suggestions on time. ...
doi:10.1155/2017/5174073
fatcat:o3wxdc5wx5c3tkio2347ypurbi
Security for QoS assured wireless and mobile networks
2010
Security and Communication Networks
Such challenges are even made harder in mobile wireless scenarios where the network infrastructure may feature mobile, energy and resource-constrained network devices. ...
The aim of this special issue is to provide an upto-date snapshot on advanced solutions to support the design and deployment of secure and efficient services in wireless mobile networks. ...
Issue for mobile ad hoc networking and computing), and ACM/Kluwer Wireless Networks and ACM/Kluwer Mobile Networks Applications, and the Journal of Wireless Communication and Mobile Computing. ...
doi:10.1002/sec.201
fatcat:nlt4di4iv5e43izj4nnty4f7bq
Security in Sensor Networks
[chapter]
2006
Mobile, Wireless, and Sensor Networks
Ron Rivest in 1995 • Main feature: data-dependent rotations • Parameterized for word size, number of rounds, length of key • Low memory requirements RC5 Plaintext Key Ciphertext Key Scheduling • Nodes and ...
base station share a master key pre-deployment • Other keys are bootstrapped from the master key: -Encryption key RC5 1 Key master Key encryption 9 Key Scheduling • Nodes and base station share a master ...
-Memory: master keys & counters,
broadcast key chain
-Battery: all nodes communicate
with it, or use it to setup keys
Providing Robust and Ubiquitous
Security Support for Mobile Ad-Hoc
Networks ...
doi:10.1002/0471755591.ch11
fatcat:bvjls4dianf3pexshqabnxdz7a
Securing the mobile enterprise with network-based security and cloud computing
2012
2012 35th IEEE Sarnoff Symposium
This paper proposes a new security architecture for the mobile enterprise which uses network-based security and cloud computing to both simplify and enhance the security of enterprises, and reinstate the ...
Keywords-cloud computing; cloud-based security; enterprise security architecture; mobile enterprise; network-based security; security. I. ...
Therefore all LAN security can be moved into the network and Cloud. ...
doi:10.1109/sarnof.2012.6222759
dblp:conf/sarnoff/ReyesMCS12
fatcat:qimznacfvrcercbp2ctnv7fctu
Secure and reliable routing in mobile adhoc networks
[article]
2012
arXiv
pre-print
The growing diffusion of wireless-enabled portable devices and the recent advances in Mobile Ad-hoc NETworks (MANETs) open new scenarios where users can benefit from anywhere and at any time for impromptu ...
MANETs presents also security challenges. These networks are prone to malicious users attack, because any device within the frequency range can get access to the MANET. ...
In this paper we use a security and a security and mobility aware approach, to improve the AODV (Ad-hoc On-demand Distance Vector) [10] routing protocol, in order to be protected from the resource exhaustion ...
arXiv:1203.2044v1
fatcat:sapvrw4xtvbave4u43czdfw54i
Security Issues and Attacks in Mobile Adhoc Networks
2016
International Journal of Engineering Research and
Then various security issues are discussed and the attacks in mobile adhoc networks have been analyzed. Then the conclusion and future work is discussed. ...
Since the topology of Mobile Ad Hoc Network (MANET) changes dynamically caused by the node mobility, providing secure routing is the main area of concern. ...
A great number of security solutions that works well for wired networks don't fit for mobile adhoc networks. ...
doi:10.17577/ijertv5is120189
fatcat:y4hpsyevivaznjdg7mumkdizzm
Security Aspects and Challenges in Mobile Adhoc Networks
2012
International Journal of Computer Network and Information Security
The traditional notion of a Adhoc wireless network is one in which there are a few Base Stations or Access Points and a number of Mobile Stations or Nodes. ...
The Adhoc networks pose a number of nontrivial challenges to security design, such as open peer-to-peer network architecture, shared wireless medium and network topology. ...
Figure 1 : 1 Working of an Adhoc Network
3 ) 3 Integrity: Message being transmitted is never corrupted. Security Aspects and Challenges in Mobile Adhoc Networks Copyright © 2012 MECS I.J. ...
doi:10.5815/ijcnis.2012.06.04
fatcat:belyeqnmard3hlxbmbdtf474au
Protocol SS7 and the Security of Mobile Networks
2019
NBI Technologies
Until mobile operators are able to abandon this technology, this threat in the field of information security will remain relevant. ...
The paper considers Global System for Mobile Communications, which plays the important role in contemporary society and carries new forms of dialog in the modern world. ...
-Режим доступа: https://blog. kaspersky.ru/hacking-cellular-networks/9862/ (дата обращения: 28.02.2017). 6. Фишер, Д. Что такое «человек посереди- не»? / Д. Фишер. -Электрон. дан. ...
doi:10.15688/nbit.jvolsu.2018.4.1
fatcat:65o6xftjdrf2zeespzj2jtsz3e
Security and Dynamic Encryption System in Mobile Ad-Hoc Network
[chapter]
2011
Mobile Ad-Hoc Networks: Protocol Design
Compared with wired networks, wireless communication provides better connectivity and mobility, which allows mobile devices to access other local area networks or the Internet at anytime and anywhere. ...
, such as battlefields, disaster relief operations, mobile device/ personal networking, mobile information sharing and vehicular networks (Kant et al., 2005) ; (Liu et al., 2007) . ...
for wireless networks, included both Base Station (BS)-oriented and mobile adhoc networks, to the security level closer to wired one. ...
doi:10.5772/12843
fatcat:yzmbahi2kvhwbkwxjmjhe5pera
Evolution of Mobility in Future Wireless Networks
2012
Journal of Cyber Security and Mobility
However, notwithstanding the above, an additional area that has important implications is to evolve seamless and non-seamless session mobility across disparate access technologies such as WiFi to offload ...
Similarly, selective handover of specific flows across smaller cells such as Femto and Pico cells of the same access technology will have an impact on the overall capacity of the network. ...
Acknowledgements I will like to thank my colleagues at Alcatel-Lucent for discussions around this topic and other general aspects of evolution in wireless networks. ...
doi:10.13052/jcsm2245-1439.117
fatcat:quvbrusem5cpfel5ogi23wyqzq
A secure and resistant architecture against attacks for mobile ad hoc networks
2010
Security and Communication Networks
The nodes' mobility results in a dynamically changing network topology. ...
The effects of direct connectivity and transmission range on the stability and security of the network are analysed. ...
In addition, the network's security is not scalable and the CA cannot be reachable by all nodes due to the nodes' mobility. ...
doi:10.1002/sec.116
fatcat:em5ygs2avfgv7ad2f6d5wepeue
« Previous
Showing results 1 — 15 out of 482,802 results